Google Android Operating System < 4.1.1 DNS Cache Poisoning Vulnerability

medium Nessus Network Monitor Plugin ID 8326
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote device is affected by a DNS cache poisoning vulnerability.


The Google Android operating system prior to 4.1.1 is vulnerable to a DNS cache poisoning vulnerability that can be triggered when a stub resolver fails to acquire a port with its own DNS port implementation and resorts to the res_randomid() function of res_init.c to obtain it. The predictability of the port may make it easier for a remote attacker to poison the DNS cache of a target user.


Upgrade to Google Android operating system version 4.1.1 or later.

See Also

Plugin Details

Severity: Medium

ID: 8326

Published: 7/17/2014

Updated: 3/6/2019

Dependencies: 5287

Risk Information


Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C


Risk Factor: Medium

Base Score: 4.8

Temporal Score: 4.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

Patch Publication Date: 7/11/2012

Vulnerability Publication Date: 7/24/2012

Reference Information

CVE: CVE-2012-2808

BID: 54657